Logo
  • Deals
    • Matériel - Aperçu
      • Informatique mobile - Aperçu
      • Ordinateurs portables
      • Stations de travail portables
      • Tablettes
      • Smartphones et téléphones portables
      • Informatique vestimentaire
      • Garanties et services - Informatique mobile
      • Accessoires - Informatique mobile
      • Pièces détachées - Informatique mobile
      • Communication et conférence - Aperçu
      • Systèmes de conférence
      • Téléphonie VoIP
      • Micro-casques
      • Webcams
      • Garanties et services - Communication
      • Accessoires - Communication
      • Infrastructure informatique - Aperçu
      • Serveurs
      • Stockage
      • Alimentations sans interruption (ASI)
      • Réseau
      • Sécurité
      • Racks
      • Garanties et services - Infrastructure informatique
      • Accessoires - Infrastructure informatique
      • Pièces détachées - Infrastructure informatique
      • Informatique - Aperçu
      • PC
      • Stations de travail
      • Clients légers
      • PC tout-en-un
      • Points de vente et points d'information
      • Garanties et services - Informatique
      • Accessoires - Informatique
      • Pièces détachées - Informatique
      • Périphériques - Aperçu
      • Écrans
      • Écrans publics
      • Téléviseurs
      • Projecteurs
      • Périphériques d'entrée
      • Audio, photo et vidéo
      • Garanties et services - Périphériques
      • Accessoires - Périphériques
      • Imprimantes et scanners - Aperçu
      • Imprimantes
      • Imprimantes d'étiquettes
      • Stations de duplication
      • Scanners
      • Lecteurs de codes-barres
      • Collecte de données mobiles
      • Consommables
      • Garanties et services
      • Accessoires - Imprimantes et scanners
      • Pièces détachées - Imprimantes
      • Composants - Aperçu
      • SSD et disques durs
      • Supports mémoire
      • Cartes graphiques
      • Lecteurs et boîtiers
      • Interfaces et contrôleurs
      • Supports de stockage
      • Alimentations
      • Processeurs
      • Accessoires - Composants
      • Connectivité - Aperçu
      • Connexion réseau
      • Connexion PC
      • Connexion USB
      • Connexion électrique
      • Connexion téléphone
      • Serveurs de périphériques
      • Extensions et répétiteurs
      • Accessoires - Connectivité
      • Équipement de bureau - Aperçu
      • Poste de travail et ergonomie
      • Smart Home
      • Nettoyage
      • Protection et sécurité
      • Appareils pour bureau
      • Supports
      • Mobilier de bureau
      • Piles et batteries
      • Accessoires - Équipement de bureau
      • Outlet - Aperçu
      • B-Stock
    • Logiciels - Aperçu
      • Stockage, sauvegarde et restauration - Aperçu
      • Solutions de sauvegarde et de restauration clients
      • Sauvegarde, restauration et archivage
      • Solutions de sauvegarde et de restauration pour serveurs
      • Logiciels de sécurité - Aperçu
      • Sécurité des terminaux
      • Sécurité des e-mails
      • Suites de sécurité
      • Sécurité mobile
      • Sécurité des réseaux
      • Sécurité du cloud
      • Sécurité des passerelles
      • Management et formation
      • Logiciels de développement - Aperçu
      • Gestion de projets et collaboration
      • Logiciels de collaboration - Aperçu
      • Communication
      • Gestion de documents
      • Échange de fichiers
      • Applications bureautiques - Aperçu
      • Logiciel Office et modules complémentaires
      • Design créatif et édition
      • Logiciels d’infrastructure - Aperçu
      • Systèmes d’exploitation
      • Surveillance et reporting
      • Déploiement de logiciels et maintenance
      • Gestion des impressions
      • Optimisation
      • Virtualisation - Aperçu
      • Virtualisation de bureau
      • Infrastructure et administration
    • Solutions IT - Aperçu
      • Business Applications - Aperçu
      • Collaboration – et le travail d’équipe fonctionne
      • Enterprise Ressource Planning
      • DMS & ECM
      • Système de gestion de modèles Docunize
      • Cloud Solutions - Aperçu
      • Services Multi Cloud
      • Public cloud
      • Clouds-Shop
      • FinOps (Financial Operations)-Service
      • Data & Analytics - Aperçu
      • Plate-forme et intégration des données
      • Analytics & AI
      • Data visualisation
      • Stratégie & Gouvernance
      • Datacenter - Aperçu
      • Multi-cloud
      • Compétence datacenter modulaire
      • Infrastructure hyperconvergée
      • Software Defined Datacenter
      • Infrastructure SAP HANA
      • IoT/AI - Aperçu
      • Bechtle Control Suite
      • Servinvent
      • Modern Workplace - Aperçu
      • Poste de travail 360° du futur
      • Device as a Service
      • Des réunions modernes
      • Communication et collaboration
      • Solutions Azure Virtual Desktop
      • Mobile working ▷ Remote & flexible on the road
      • Managed Workplace Services
      • Gestion efficace des salles
      • Workplace Security
      • Networking - Aperçu
      • Datacentre Networking
      • Enterprise Networking
      • Bechtle service bundles for Cisco infrastructure
      • Sécurité - Aperçu
      • Application Security
      • Securité du cloud
      • Cyber Security
      • Sécurité des datacenters
      • Data protection and information security
      • Infrastructure & Perimeter Security
      • IAM Identity & Access Management
      • Formation security awareness
      • Ransomware
      • Cyber Defence Centre
      • Solutions d’affichage - Aperçu
      • L'accueil
      • Wayfinding
      • Communication avec les employés
    • Services IT - Aperçu
    • Support & Exploitation
      • Consulting Services - Aperçu
      • Conseils Cloud
      • Managed Services - Aperçu
      • Printing Services
      • Azure Operations
      • 360° Managed IT
      • Bechtle Prime Support
    • Onsite Services
    • Professional Services
      • Software Asset Management - Aperçu
      • SAM as a Service
      • SAM Baseline
      • SAM Solution Advisory
      • SAM Cloud Readiness
      • SAM Consulting
      • SAM Century Platform
      • SAM Inventory2go
      • Workplace Services - Aperçu
      • Evaluation, conception et procurement
      • Services de staging et de déploiement
      • Services IMAC/RD
      • Service Break&Fix
      • Accessoires IT sur mesure
      • Services financiers - Aperçu
      • Conseils ▷ Services financiers | Des services IT de Bechtle
      • Structuration ▷ Services financiers | Services IT Bechtle
      • Financement ▷ Services financiers | Des services IT de Bechtle
      • E-Procurement - Aperçu
      • My Bechtle
      • Connexion ERP
      • Facturation électronique
      • Devis
      • Contrats cadres
      • Conditions spéciales
      • Promotion Products - Aperçu
      • Nouveautés
      • Clés USB
      • Station de chargement sans fil
      • Powerbanks
      • Gamme ProPro
      • Lifestyle
      • La webkey
      • Produits promotionnels 3D
      • Verre trempé avec marquage digital
      • Quickservice
      • Processus
    • 360° Managed-IT - Aperçu
    • 360° Managed IT sur Microsoft Azure
    • 360° swiss cube
    • 360° colocation
    • 360° infrastructure
    • 360° firewall
    • 360° network
    • 360° backup control
    • 360° cloud backup
    • 360° monitoring
    • 360° CIRT
    • Carrière - Aperçu
      • Bechtle as an employer - Aperçu
      • Développement
      • Vos avantages
      • Domaines d'activité - Aperçu
      • IT
      • Ventes
      • Autres domaines
    • Formation professionnelle
    • Processus de recrutement
    • Ressources humaines
    • Jobs
    • À propos de Bechtle - Aperçu
      • Entreprise - Aperçu
      • Management
      • Direction de Bechtle en Suisse
      • Les sites
      • Les entreprises Bechtle
      • La success story de Bechtle
      • Vision 2030
      • Certifications
      • Bechtle en Suisse
      • Relations investisseurs - Aperçu
      • L’action Bechtle
      • Publications
      • Calendrier financier
      • Assemblée générale
      • Gouvernance d’entreprise
      • Investisseurs – Contact
      • Actionnaires privé(e)s
      • Ventes de logiciels selon IFRS 15
    • Durabilité
      • Événements - Aperçu
      • Bechtle IT Forum 2025 - Replay
      • Webinar Replay Bechtle
      • Webinar: Intel Xeon 6 (Only German)
      • Bechtle X-Mas Market.
      • Webinar: Discover Cybersecurity with Arctic Wolf (Only German)
    • Références
      • Secteur Public - Aperçu
      • Écoles et IT
      • OCRE avec Bechtle
      • International business with Bechtle - Aperçu
      • Bechtle Global IT Alliance
    • Partenaires
      • Contact - Aperçu
      • Bechtle direct Rotkreuz
      • Bechtle direct Dübendorf
      • Bechtle direct AG Schweiz Morges
      • Bechtle Suisse SA
      • Support
      • Actualites - Aperçu
      • Salle d'actualité
      • Actualité du groupe
      • Newsletter
      • Bechtle Blog CH
      • Podcast. bits & bytes
À propos de Bechtle
Actualites
Bechtle Blog CH
Cloud / Data Center
Cloud security - tips from our expert Maximilian Munker
security_header_1440x480.jpg
Cloud / Data Center - 10 nov. 2022

Avoid these security risks and make your cloud more secure.

de Maximilian Munker

  1.  
  2.  
  3. 1. insufficient identity and authorisation management
  4. One of the core components of a functional cloud computing platform is identity and authorisation management, as this is essential for all access to services, applications and information. The main pillars of this system are authentication, authorisation of identities and the publication of attributes such as access rights. If misconfigurations or anomalies occur, there is a risk that identities could gain access to unauthorised information and, in the worst case, exfiltrate data. This also poses a significant risk if external parties gain access to the identities and can thus move freely through corporate resources and cloud infrastructure.
  5.  
  6. The visibility, scope and management of identity-related information, data and authorisations in such an environment requires a comprehensive, flexible and secure Identity and Access Management (IDA). This should be secured by several protective measures in order to be able to check access effectively. There are various aids in the form of technologies such as multi-factor authentication, conditional access or behaviour-based user analyses. Here, all user behaviour is proactively monitored and automated messages are generated in the event of anomalies.
  7.  
  8. With our Bechtle iam amira solution, we guarantee a rule-compliant and seamless linking of people and their accounts, mailboxes, resources, and access rights - throughout the entire life cycle of the objects.
  9.  
2. system vulnerabilities

Organisations are increasingly relying on cloud platforms such as Amazon AWS, Microsoft Azure or Google Cloud to run their business-critical applications and for their data and file management, as they advertise high security standards and various data centre certifications based on international standards. This gives the customer the impression that security is in good hands here. However, one must still be aware that the security of the company data as well as configurations of the services are still in the hands of the customer.

Although cloud service providers take on some security responsibilities, their customers still bear the responsibility for the security of end-user data, applications, operating systems, endpoints and network traffic. And just like on-premise applications, you need to monitor user and system activity to detect attacks. In addition, cloud platforms bring new security complications such as:

  • Complex and often erroneous configuration of cloud-based security tools.
  • DevOps processes that deploy application code daily or even hourly
  • Attacks specifically targeted against cloud platforms
  • Complex compliance requirements
  1.  
  2. 3. lack of cloud security architecture and strategy
  3. The cloud, whether private cloud, public cloud or hybrid cloud, promises agility, efficiency and cost-effectiveness. These are transformative attributes for any business: They make it possible to adapt to market changes through rapid service delivery and to make data-driven decisions. However, businesses can be prevented from using cloud resources without exposing themselves and their data to risk. With a cloud security architecture, businesses can take advantage of all the benefits that cloud products offer, including Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS) and Infrastructure-as-a-Service (IaaS), while minimising risks and security vulnerabilities. Without cloud security architecture, the risks of cloud use can outweigh its potential benefits.

  4. Cloud architecture describes the combination of technology components to build a cloud in which resources are bundled through virtualisation technology and shared in a network. Consistent application of cloud security measures can significantly reduce the risk of failures, data loss, DDoS attacks or unauthorised access. The concrete measures in each case consist of a combination of rules, processes and technical specifications to secure the entire cloud infrastructure and its applications.

    Cloud computing service providers that ensure confidentiality, integrity and availability are prerequisites for the secure use of cloud resources. Companies need a cloud infrastructure that is characterised by high performance. At the same time, this infrastructure must be reliable and trustworthy. An effective cloud security architecture relies on cloud architects who know that a trustworthy foundation must be a top priority in the initial planning stages and cannot simply be added later. Security is not a commodity, but an essential component.

  5. As a multi-cloud service provider, Bechtle also offers a variety of public cloud solutions in addition to its own-produced cloud services. This results from the close cooperation with leading cloud providers, which thus enables customers to choose from an even wider range of high-performance solutions. The use of Bechtle's cloud services is completely uncomplicated for customers thanks to fully automated procurement, provisioning and billing.

 

Rédigé par

max-munker_portrait.png
Maximilian Munker
Consultant Information Security

E-Mail: maximilian.munker@bechtle.com

    Nous avons publié cet article le 10 nov. 2022.
    Le groupe
    Sites Bechtle
    Carrière
    Presse
    Relations investisseurs
    Événements
    Conditions de livraison et de paiement
    Centre d'aide
    Contact
    Support
    Newsletter

    LinkedIn Bechtle LinkedIn Bechtle Schweiz AG

    LinkedIn Bechtle LinkedIn Bechtle direct AG

    YouTube Bechtle YouTube

    Instagram Bechtle Instagram

    Facebook Bechtle Facebook

    Notre offre est exclusivement destinée aux clients professionnels et publics.

    Les prix se comprennent en CHF hors TVA en vigueur.

    Mentions légales Déclaration de protection des données CGV
    Support-ID: 19b6ac7fa4
    © 2025 Bechtle AG